SmartIdx: Reducing Communication Cost in Federated Learning by Exploiting the CNNs Structures. | 0 | 0.34 | 2022 |
Exploiting Knowledge for Better Mobility Support in the Future Internet | 0 | 0.34 | 2022 |
Adapting Named Data Networking (NDN) for Better Consumer Mobility Support in LEO Satellite Networks | 1 | 0.35 | 2021 |
D 2 Graph: An Efficient and Unified Out-of-Core Graph Computing Model | 0 | 0.34 | 2021 |
Finding Route Hotspots in Large Labeled Networks | 0 | 0.34 | 2021 |
Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities | 0 | 0.34 | 2021 |
Mining top-k sequential patterns in transaction database graphs: A new challenging problem and a sampling-based approach | 0 | 0.34 | 2020 |
QSAN: A Quantum-probability based Signed Attention Network for Explainable False Information Detection | 0 | 0.34 | 2020 |
AFLPro: Direction sensitive fuzzing | 0 | 0.34 | 2020 |
EDCleaner: Data Cleaning for Entity Information in Social Network | 0 | 0.34 | 2019 |
Mann: A Multichannel Attentive Neural Network For Legal Judgment Prediction | 1 | 0.36 | 2019 |
A Low-overhead Kernel Object Monitoring Approach for Virtual Machine Introspection. | 0 | 0.34 | 2019 |
A More Efficient Private Set Intersection Protocol based on Random OT and Balance hash | 0 | 0.34 | 2019 |
VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries | 0 | 0.34 | 2019 |
Towards a Comprehensive Insight into the Eclipse Attacks of Tor Hidden Services | 3 | 0.42 | 2019 |
Analyzing and Predicting the Popularity of Online Content Using the Weak Ties Theory. | 0 | 0.34 | 2019 |
Automated Vulnerability Discovery and Exploitation in the Internet of Things. | 0 | 0.34 | 2019 |
Modeling, measuring, and analyzing the resolution process of popular domains | 0 | 0.34 | 2019 |
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems | 1 | 0.35 | 2018 |
Security Measurement for Unknown Threats Based on Attack Preferences. | 1 | 0.36 | 2018 |
Stock Market Prediction via Multi-Source Multiple Instance Learning. | 4 | 0.41 | 2018 |
Exploiting Investors Social Network for Stock Prediction in China's Market. | 1 | 0.35 | 2018 |
Sapiens Chain: A Blockchain-based Cybersecurity Framework. | 0 | 0.34 | 2018 |
Evaluation on Availability of Entity Information in Cyberspace. | 0 | 0.34 | 2018 |
Detection of Malicious Domain Names Based on Hidden Markov Model. | 0 | 0.34 | 2018 |
A flexible and efficient container-based NFV platform for middlebox networking. | 0 | 0.34 | 2018 |
Topic Analysis Model for Online Social Network | 0 | 0.34 | 2018 |
A Closer Look At Eclipse Attacks Against Tor Hidden Services | 0 | 0.34 | 2017 |
RICS-DFA: a space and time-efficient signature matching algorithm with Reduced Input Character Set. | 0 | 0.34 | 2017 |
A Survey on Data Cleaning Methods in Cyberspace | 1 | 0.38 | 2017 |
IAD: Interaction-Aware Diffusion Framework in Social Networks. | 1 | 0.35 | 2017 |
Succinct and practical greedy embedding for geometric routing. | 0 | 0.34 | 2017 |
Keep all mobile users' whereabouts secure: a radio frequency identification protocol anti-tracking in 5G | 1 | 0.35 | 2016 |
Modeling Mobile Cellular Networks Based On Social Characteristics | 0 | 0.34 | 2016 |
Towards Route Dynamics In As-Level Path Prediction | 1 | 0.37 | 2016 |
Community-Based Recommendations: A Solution to the Vulnerability Problem | 0 | 0.34 | 2016 |
Understanding information interactions in diffusion: an evolutionary game-theoretic perspective. | 2 | 0.38 | 2016 |
Understanding Information Diffusion under Interactions. | 2 | 0.36 | 2016 |
An ICN-Oriented Name-Based Routing Scheme | 0 | 0.34 | 2015 |
Online Detection of Concurrent Prefix Hijacks. | 1 | 0.34 | 2014 |
Utility-based cooperative decision in cooperative authentication. | 5 | 0.49 | 2014 |
A Moving Target Framework to Improve Network Service Accessibility | 0 | 0.34 | 2014 |
A Multiobjective Particle Swarm Optimization-Based Partial Classification for Accident Severity Analysis | 1 | 0.35 | 2014 |
POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine | 0 | 0.34 | 2014 |
Predicting the topic influence trends in social media with multiple models | 7 | 0.46 | 2014 |
T-Yun: Trustworthiness Verification And Audit On The Cloud Providers | 1 | 0.34 | 2013 |
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets. | 1 | 0.43 | 2013 |
Understanding the topologies of BitTorrent networks: A measurement view | 0 | 0.34 | 2012 |
SDFA: series DFA for memory-efficient regular expression matching | 0 | 0.34 | 2012 |
An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks | 0 | 0.34 | 2012 |